메뉴 건너뛰기




Volumn 20, Issue 2, 2010, Pages 442-453

A novel CRT-based watermarking technique for authentication of multimedia contents

Author keywords

Chinese remainder theorem; Digital watermarking; Singular value decomposition

Indexed keywords

COMPUTATION THEORY; COMPUTATIONAL EFFICIENCY; COPYRIGHTS; DIGITAL WATERMARKING; SIGNAL TO NOISE RATIO;

EID: 76349090439     PISSN: 10512004     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.dsp.2009.07.004     Document Type: Article
Times cited : (41)

References (23)
  • 3
    • 0032625842 scopus 로고    scopus 로고
    • Watermarking as communication with side information
    • Cox I.J., Miller M.L., and Mckellips A.L. Watermarking as communication with side information. Proc. IEEE 87 7 (1999) 1127-1141
    • (1999) Proc. IEEE , vol.87 , Issue.7 , pp. 1127-1141
    • Cox, I.J.1    Miller, M.L.2    Mckellips, A.L.3
  • 4
    • 0035473831 scopus 로고    scopus 로고
    • Secret and public key image watermarking schemes for image authentication and ownership verification
    • Wong P.W., and Memon N. Secret and public key image watermarking schemes for image authentication and ownership verification. IEEE Trans. Image Process. 10 10 (2001) 1593-1601
    • (2001) IEEE Trans. Image Process. , vol.10 , Issue.10 , pp. 1593-1601
    • Wong, P.W.1    Memon, N.2
  • 5
    • 33646415682 scopus 로고    scopus 로고
    • Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol
    • Chen T.H., and Tsai D.S. Owner-customer right protection mechanism using a watermarking scheme and a watermarking protocol. Pattern Recognition 39 8 (2006) 1530-1541
    • (2006) Pattern Recognition , vol.39 , Issue.8 , pp. 1530-1541
    • Chen, T.H.1    Tsai, D.S.2
  • 6
    • 0035248504 scopus 로고    scopus 로고
    • A robust image authentication method distinguishing JPEG compression from malicious manipulation
    • Lin C.Y., and Chang S.F. A robust image authentication method distinguishing JPEG compression from malicious manipulation. IEEE Trans. Circ. Syst. Video Technol. 11 2 (2001) 153-168
    • (2001) IEEE Trans. Circ. Syst. Video Technol. , vol.11 , Issue.2 , pp. 153-168
    • Lin, C.Y.1    Chang, S.F.2
  • 7
    • 0032785523 scopus 로고    scopus 로고
    • Hidden digital watermarks in images
    • Hsu C.T., and Wu J.L. Hidden digital watermarks in images. IEEE Trans. Image Process. 8 1 (1999) 58-68
    • (1999) IEEE Trans. Image Process. , vol.8 , Issue.1 , pp. 58-68
    • Hsu, C.T.1    Wu, J.L.2
  • 8
    • 0037644874 scopus 로고    scopus 로고
    • Watermark detection based on the properties of error control codes
    • Loo P., and Kingsbury N. Watermark detection based on the properties of error control codes. IEE Proc. Vis. Image Signal Process. 150 2 (2003) 115-121
    • (2003) IEE Proc. Vis. Image Signal Process. , vol.150 , Issue.2 , pp. 115-121
    • Loo, P.1    Kingsbury, N.2
  • 9
    • 47049094180 scopus 로고    scopus 로고
    • A simple ICA-based watermarking scheme
    • Nguyen T.V., and Patra J.C. A simple ICA-based watermarking scheme. Digit. Signal Process. 18 (2008) 762-776
    • (2008) Digit. Signal Process. , vol.18 , pp. 762-776
    • Nguyen, T.V.1    Patra, J.C.2
  • 10
    • 0036502697 scopus 로고    scopus 로고
    • An SVD-based watermarking scheme for protecting rightful ownership
    • Liu R., and Tan T. An SVD-based watermarking scheme for protecting rightful ownership. IEEE Trans. Multimed. 4 1 (2002) 121-128
    • (2002) IEEE Trans. Multimed. , vol.4 , Issue.1 , pp. 121-128
    • Liu, R.1    Tan, T.2
  • 11
    • 33645221486 scopus 로고    scopus 로고
    • A semi-blind digital watermarking scheme based on singular value decomposition
    • Shieh J.M., Lou D.C., and Chang M.C. A semi-blind digital watermarking scheme based on singular value decomposition. Comput. Stand. Interf. 28 4 (2006) 428-440
    • (2006) Comput. Stand. Interf. , vol.28 , Issue.4 , pp. 428-440
    • Shieh, J.M.1    Lou, D.C.2    Chang, M.C.3
  • 16
    • 0036396975 scopus 로고    scopus 로고
    • Hierarchical access control based on Chinese remainder theorem
    • Chen T.-S., and Chung Y.-F. Hierarchical access control based on Chinese remainder theorem. Comput. Secur. 2 6 (2002) 565-570
    • (2002) Comput. Secur. , vol.2 , Issue.6 , pp. 565-570
    • Chen, T.-S.1    Chung, Y.-F.2
  • 17
    • 45549098627 scopus 로고    scopus 로고
    • Sharing secrets in stego images with authentication
    • Chang C.-C., Hsieh Y.-P., and Lin C.-H. Sharing secrets in stego images with authentication. Pattern Recognition 41 (2008) 3130-3137
    • (2008) Pattern Recognition , vol.41 , pp. 3130-3137
    • Chang, C.-C.1    Hsieh, Y.-P.2    Lin, C.-H.3
  • 18
    • 27844564305 scopus 로고    scopus 로고
    • A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem
    • Myung S., and Yang K. A combining method of quasi-cyclic LDPC codes by Chinese remainder theorem. IEEE Comm. Lett. 9 9 (2005) 823-825
    • (2005) IEEE Comm. Lett. , vol.9 , Issue.9 , pp. 823-825
    • Myung, S.1    Yang, K.2
  • 19
    • 0346146968 scopus 로고    scopus 로고
    • RNS sign detector based on Chinese remainder theorem II (CRT II)
    • Al-Radadi E., and Siy P. RNS sign detector based on Chinese remainder theorem II (CRT II). Comput. Math. Appl. 46 (2003) 1559-1570
    • (2003) Comput. Math. Appl. , vol.46 , pp. 1559-1570
    • Al-Radadi, E.1    Siy, P.2
  • 20
    • 56149118070 scopus 로고    scopus 로고
    • Robust t-out-of-n oblivious transfer mechanism based on CRT
    • Chang C.-C., and Lee J.-S. Robust t-out-of-n oblivious transfer mechanism based on CRT. J. Netw. Comput. Appl. 32 1 (2009) 226-235
    • (2009) J. Netw. Comput. Appl. , vol.32 , Issue.1 , pp. 226-235
    • Chang, C.-C.1    Lee, J.-S.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.